"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-03-17 21:57:27 +00:00
parent e154f9720e
commit 8b34dd9ed3
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
61 changed files with 3771 additions and 3771 deletions

View File

@ -53,14 +53,9 @@
"references": {
"reference_data": [
{
"name" : "MDKSA-2000-083",
"refsource" : "MANDRAKE",
"url" : "http://www.linux-mandrake.com/en/updates/2000/MDKSA-2000-083.php3"
},
{
"name" : "CLA-2000:365",
"refsource" : "CONECTIVA",
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000365"
"name": "6284",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/6284"
},
{
"name": "RHSA-2000:127",
@ -68,9 +63,14 @@
"url": "http://www.redhat.com/support/errata/RHSA-2000-127.html"
},
{
"name" : "DSA-006-1",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2000/20001219"
"name": "zope-calculate-roles(5777)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5777"
},
{
"name": "MDKSA-2000-083",
"refsource": "MANDRAKE",
"url": "http://www.linux-mandrake.com/en/updates/2000/MDKSA-2000-083.php3"
},
{
"name": "FreeBSD-SA-01:06",
@ -78,14 +78,14 @@
"url": "ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:06.zope.asc"
},
{
"name" : "zope-calculate-roles(5777)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5777"
"name": "CLA-2000:365",
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000365"
},
{
"name" : "6284",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/6284"
"name": "DSA-006-1",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2000/20001219"
}
]
}

View File

@ -57,6 +57,11 @@
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=97916374410647&w=2"
},
{
"name": "linuxconf-vpop3d-symlink(5923)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5923"
},
{
"name": "MDKSA-2001:011",
"refsource": "MANDRAKE",
@ -66,11 +71,6 @@
"name": "2186",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2186"
},
{
"name" : "linuxconf-vpop3d-symlink(5923)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/5923"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "20010413 Trend Micro Interscan VirusWall 3.01 vulnerability",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-04/0218.html"
},
{
"name": "2579",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/2579"
},
{
"name": "20010413 Trend Micro Interscan VirusWall 3.01 vulnerability",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2001-04/0218.html"
}
]
}

View File

@ -57,15 +57,15 @@
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-045"
},
{
"name" : "isa-proxy-memory-leak-dos(6990)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/6990"
},
{
"name": "3197",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3197"
},
{
"name": "isa-proxy-memory-leak-dos(6990)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6990"
}
]
}

View File

@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "20011128 PowerFTP-server-Bugs&Exploits-Remotes",
"refsource" : "BUGTRAQ",
"url" : "http://marc.info/?l=bugtraq&m=100698397818175&w=2"
},
{
"name": "powerftp-dot-directory-traversal(7615)",
"refsource": "XF",
@ -66,6 +61,11 @@
"name": "3593",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3593"
},
{
"name": "20011128 PowerFTP-server-Bugs&Exploits-Remotes",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=bugtraq&m=100698397818175&w=2"
}
]
}

View File

@ -52,6 +52,11 @@
},
"references": {
"reference_data": [
{
"name": "3658",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3658"
},
{
"name": "DSA-092",
"refsource": "DEBIAN",
@ -61,11 +66,6 @@
"name": "wmtv-execute-commands(7669)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/7669.php"
},
{
"name" : "3658",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/3658"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2008-1091",
"STATE": "PUBLIC"
},
@ -57,6 +57,51 @@
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/492020/100/0/threaded"
},
{
"name": "MS08-026",
"refsource": "MS",
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-026"
},
{
"name": "29104",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/29104"
},
{
"name": "VU#543907",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/543907"
},
{
"name": "ADV-2008-1504",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/1504/references"
},
{
"name": "oval:org.mitre.oval:def:5494",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5494"
},
{
"name": "1020013",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1020013"
},
{
"name": "SSRT080071",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=121129490723574&w=2"
},
{
"name": "30143",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30143"
},
{
"name": "TA08-134A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/cas/techalerts/TA08-134A.html"
},
{
"name": "http://www.zerodayinitiative.com/advisories/ZDI-08-023",
"refsource": "MISC",
@ -66,51 +111,6 @@
"name": "HPSBST02336",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq&m=121129490723574&w=2"
},
{
"name" : "SSRT080071",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=121129490723574&w=2"
},
{
"name" : "MS08-026",
"refsource" : "MS",
"url" : "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-026"
},
{
"name" : "TA08-134A",
"refsource" : "CERT",
"url" : "http://www.us-cert.gov/cas/techalerts/TA08-134A.html"
},
{
"name" : "VU#543907",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/543907"
},
{
"name" : "29104",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/29104"
},
{
"name" : "oval:org.mitre.oval:def:5494",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5494"
},
{
"name" : "ADV-2008-1504",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/1504/references"
},
{
"name" : "1020013",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id?1020013"
},
{
"name" : "30143",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30143"
}
]
}

View File

@ -52,26 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "5970",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/5970"
},
{
"name" : "30002",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/30002"
},
{
"name" : "30712",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/30712"
},
{
"name" : "4619",
"refsource" : "SREASON",
"url" : "http://securityreason.com/securityalert/4619"
},
{
"name": "ADV-2008-1971",
"refsource": "VUPEN",
@ -81,6 +61,26 @@
"name": "eshop100-index-sql-injection(43452)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/43452"
},
{
"name": "30712",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30712"
},
{
"name": "30002",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30002"
},
{
"name": "5970",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/5970"
},
{
"name": "4619",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4619"
}
]
}

View File

@ -52,16 +52,16 @@
},
"references": {
"reference_data": [
{
"name" : "20080626 WellyBlog Open Source Blog Portal Cross Site Scripting Vulnerabilitiy",
"refsource" : "BUGTRAQ",
"url" : "http://www.securityfocus.com/archive/1/493710/100/0/threaded"
},
{
"name": "4645",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4645"
},
{
"name": "20080626 WellyBlog Open Source Blog Portal Cross Site Scripting Vulnerabilitiy",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/493710/100/0/threaded"
},
{
"name": "wellyblog-edit-xss(43433)",
"refsource": "XF",

View File

@ -58,24 +58,24 @@
"url": "http://www.securityfocus.com/data/vulnerabilities/exploits/30814.html.txt"
},
{
"name" : "http://packetstormsecurity.org/0808-exploits/wms-overflow.txt",
"refsource" : "MISC",
"url" : "http://packetstormsecurity.org/0808-exploits/wms-overflow.txt"
"name": "windowsmediaservices-callhtmlhelp-bo(44629)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44629"
},
{
"name": "30814",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30814"
},
{
"name": "http://packetstormsecurity.org/0808-exploits/wms-overflow.txt",
"refsource": "MISC",
"url": "http://packetstormsecurity.org/0808-exploits/wms-overflow.txt"
},
{
"name": "1020733",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1020733"
},
{
"name" : "windowsmediaservices-callhtmlhelp-bo(44629)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/44629"
}
]
}

View File

@ -52,6 +52,16 @@
},
"references": {
"reference_data": [
{
"name": "32841",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/32841"
},
{
"name": "realestatesolution-index-sql-injection(46792)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46792"
},
{
"name": "7200",
"refsource": "EXPLOIT-DB",
@ -62,25 +72,15 @@
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/32429"
},
{
"name" : "ADV-2008-3239",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/3239"
},
{
"name" : "32841",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/32841"
},
{
"name": "4674",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/4674"
},
{
"name" : "realestatesolution-index-sql-injection(46792)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/46792"
"name": "ADV-2008-3239",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/3239"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2008-5472",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -57,6 +57,11 @@
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/6737"
},
{
"name": "ADV-2008-2798",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2008/2798"
},
{
"name": "31730",
"refsource": "BID",
@ -67,11 +72,6 @@
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/30472"
},
{
"name" : "ADV-2008-2798",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2008/2798"
},
{
"name": "lokicms-index-directory-traversal(45822)",
"refsource": "XF",

View File

@ -53,24 +53,24 @@
"references": {
"reference_data": [
{
"name" : "http://www.ibm.com/support/docview.wss?crawler=1&uid=swg1IO14165",
"refsource" : "CONFIRM",
"url" : "http://www.ibm.com/support/docview.wss?crawler=1&uid=swg1IO14165"
"name": "IO14165",
"refsource": "AIXAPAR",
"url": "http://www.ibm.com/support/docview.wss?uid=swg1IO14165"
},
{
"name": "http://www.ibm.com/support/docview.wss?uid=swg24030320",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?uid=swg24030320"
},
{
"name" : "IO14165",
"refsource" : "AIXAPAR",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg1IO14165"
},
{
"name": "ibm-tds-idswebapp-info-disc(68585)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68585"
},
{
"name": "http://www.ibm.com/support/docview.wss?crawler=1&uid=swg1IO14165",
"refsource": "CONFIRM",
"url": "http://www.ibm.com/support/docview.wss?crawler=1&uid=swg1IO14165"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-0076",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-0232",
"STATE": "PUBLIC"
},
@ -53,25 +53,15 @@
"references": {
"reference_data": [
{
"name" : "24310",
"refsource" : "EXPLOIT-DB",
"url" : "http://www.exploit-db.com/exploits/24310"
"name": "http://itsecuritysolutions.org/2013-01-22-ZoneMinder-Video-Server-arbitrary-command-execution-vulnerability/",
"refsource": "MISC",
"url": "http://itsecuritysolutions.org/2013-01-22-ZoneMinder-Video-Server-arbitrary-command-execution-vulnerability/"
},
{
"name": "[oss-security] 20130128 Re: CVE Request: zoneminder: arbitrary command execution vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/01/28/2"
},
{
"name" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698910",
"refsource" : "MISC",
"url" : "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698910"
},
{
"name" : "http://itsecuritysolutions.org/2013-01-22-ZoneMinder-Video-Server-arbitrary-command-execution-vulnerability/",
"refsource" : "MISC",
"url" : "http://itsecuritysolutions.org/2013-01-22-ZoneMinder-Video-Server-arbitrary-command-execution-vulnerability/"
},
{
"name": "http://www.zoneminder.com/forums/viewtopic.php?f=29&t=20771",
"refsource": "MISC",
@ -82,6 +72,16 @@
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2640"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698910",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698910"
},
{
"name": "24310",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/24310"
},
{
"name": "89529",
"refsource": "OSVDB",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2013-0832",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html",
"refsource" : "CONFIRM",
"url" : "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=160380",
"refsource": "CONFIRM",
@ -71,6 +66,11 @@
"name": "oval:org.mitre.oval:def:16310",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16310"
},
{
"name": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html",
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2013/01/stable-channel-update.html"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security@google.com",
"ID": "CVE-2013-0893",
"STATE": "PUBLIC"
},
@ -57,6 +57,11 @@
"refsource": "CONFIRM",
"url": "http://googlechromereleases.blogspot.com/2013/02/stable-channel-update_21.html"
},
{
"name": "oval:org.mitre.oval:def:15682",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15682"
},
{
"name": "https://code.google.com/p/chromium/issues/detail?id=168570",
"refsource": "CONFIRM",
@ -66,11 +71,6 @@
"name": "openSUSE-SU-2013:0454",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2013-03/msg00045.html"
},
{
"name" : "oval:org.mitre.oval:def:15682",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15682"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "security_alert@emc.com",
"ID": "CVE-2013-0929",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-1808",
"STATE": "PUBLIC"
},
@ -52,6 +52,21 @@
},
"references": {
"reference_data": [
{
"name": "https://github.com/jonrohan/ZeroClipboard/commit/a0e02933f5f7ce5f364fbad36a005f0a349f0696",
"refsource": "CONFIRM",
"url": "https://github.com/jonrohan/ZeroClipboard/commit/a0e02933f5f7ce5f364fbad36a005f0a349f0696"
},
{
"name": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb",
"refsource": "CONFIRM",
"url": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb"
},
{
"name": "[oss-security] 20130326 Re: WordPress plugins vulnerable to CVE-2013-1808",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/03/26/8"
},
{
"name": "20130218 XSS vulnerabilities in ZeroClipboard",
"refsource": "FULLDISC",
@ -63,19 +78,9 @@
"url": "http://seclists.org/fulldisclosure/2013/Feb/109"
},
{
"name" : "20130301 XSS vulnerabilities in em-shorty, RepRapCalculator, Fulcrum, Django and aCMS",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2013/Mar/5"
},
{
"name" : "20130409 XSS and FPD vulnerabilities in ZeroClipboard in multiple themes for WordPress",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2013/Apr/88"
},
{
"name" : "20130418 XSS vulnerabilities in ZeroClipboard in multiple plugins for WordPress",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2013/Apr/87"
"name": "http://securityvulns.ru/docs29105.html",
"refsource": "MISC",
"url": "http://securityvulns.ru/docs29105.html"
},
{
"name": "[oss-security] 20130302 Re: [Full-disclosure] XSS vulnerabilities in em-shorty, RepRapCalculator, Fulcrum, Django and aCMS - ZeroClipboard.swf",
@ -83,19 +88,14 @@
"url": "http://www.openwall.com/lists/oss-security/2013/03/03/3"
},
{
"name" : "[oss-security] 20130310 WordPress plugins vulnerable to CVE-2013-1808",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/03/10/2"
"name": "20130301 XSS vulnerabilities in em-shorty, RepRapCalculator, Fulcrum, Django and aCMS",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2013/Mar/5"
},
{
"name" : "[oss-security] 20130324 XSS vulnerabilities in ZeroClipboard and multiple web applications",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/03/25/1"
},
{
"name" : "[oss-security] 20130326 Re: WordPress plugins vulnerable to CVE-2013-1808",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/03/26/8"
"name": "20130418 XSS vulnerabilities in ZeroClipboard in multiple plugins for WordPress",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2013/Apr/87"
},
{
"name": "http://securityvulns.ru/docs29103.html",
@ -107,25 +107,25 @@
"refsource": "MISC",
"url": "http://securityvulns.ru/docs29104.html"
},
{
"name" : "http://securityvulns.ru/docs29105.html",
"refsource" : "MISC",
"url" : "http://securityvulns.ru/docs29105.html"
},
{
"name": "https://github.com/jonrohan/ZeroClipboard/blob/master/docs/releases.md#zeroclipboard-108",
"refsource": "CONFIRM",
"url": "https://github.com/jonrohan/ZeroClipboard/blob/master/docs/releases.md#zeroclipboard-108"
},
{
"name" : "https://github.com/jonrohan/ZeroClipboard/commit/a0e02933f5f7ce5f364fbad36a005f0a349f0696",
"refsource" : "CONFIRM",
"url" : "https://github.com/jonrohan/ZeroClipboard/commit/a0e02933f5f7ce5f364fbad36a005f0a349f0696"
"name": "[oss-security] 20130310 WordPress plugins vulnerable to CVE-2013-1808",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/03/10/2"
},
{
"name" : "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb",
"refsource" : "CONFIRM",
"url" : "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb"
"name": "20130409 XSS and FPD vulnerabilities in ZeroClipboard in multiple themes for WordPress",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2013/Apr/88"
},
{
"name": "[oss-security] 20130324 XSS vulnerabilities in ZeroClipboard and multiple web applications",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/03/25/1"
},
{
"name": "58257",

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2013-3138",
"STATE": "PUBLIC"
},

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4138",
"STATE": "PUBLIC"
},
@ -52,11 +52,6 @@
},
"references": {
"reference_data": [
{
"name" : "[oss-security] 20130717 Re: CVE request for Drupal contrib modules",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2013/07/17/1"
},
{
"name": "https://drupal.org/node/2038363",
"refsource": "MISC",
@ -66,6 +61,11 @@
"name": "https://drupal.org/node/2038189",
"refsource": "CONFIRM",
"url": "https://drupal.org/node/2038189"
},
{
"name": "[oss-security] 20130717 Re: CVE request for Drupal contrib modules",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2013/07/17/1"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4481",
"STATE": "PUBLIC"
},
@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=988998",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=988998"
},
{
"name": "RHSA-2013:1603",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1603.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=988998",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=988998"
}
]
}

View File

@ -53,15 +53,20 @@
"references": {
"reference_data": [
{
"name" : "http://anonsvn.wireshark.org/viewvc/trunk/plugins/profinet/packet-pn-rt.c?r1=50651&r2=50650&pathrev=50651",
"name": "https://www.wireshark.org/security/wnpa-sec-2013-53.html",
"refsource": "CONFIRM",
"url" : "http://anonsvn.wireshark.org/viewvc/trunk/plugins/profinet/packet-pn-rt.c?r1=50651&r2=50650&pathrev=50651"
"url": "https://www.wireshark.org/security/wnpa-sec-2013-53.html"
},
{
"name": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=50651",
"refsource": "CONFIRM",
"url": "http://anonsvn.wireshark.org/viewvc?view=revision&revision=50651"
},
{
"name": "54425",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/54425"
},
{
"name": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html",
"refsource": "CONFIRM",
@ -72,11 +77,6 @@
"refsource": "CONFIRM",
"url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8904"
},
{
"name" : "https://www.wireshark.org/security/wnpa-sec-2013-53.html",
"refsource" : "CONFIRM",
"url" : "https://www.wireshark.org/security/wnpa-sec-2013-53.html"
},
{
"name": "GLSA-201308-05",
"refsource": "GENTOO",
@ -93,9 +93,9 @@
"url": "http://secunia.com/advisories/54296"
},
{
"name" : "54425",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/54425"
"name": "http://anonsvn.wireshark.org/viewvc/trunk/plugins/profinet/packet-pn-rt.c?r1=50651&r2=50650&pathrev=50651",
"refsource": "CONFIRM",
"url": "http://anonsvn.wireshark.org/viewvc/trunk/plugins/profinet/packet-pn-rt.c?r1=50651&r2=50650&pathrev=50651"
}
]
}

View File

@ -63,16 +63,16 @@
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0002"
},
{
"name" : "RHSA-2018:0003",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:0003"
},
{
"name": "RHSA-2018:0004",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0004"
},
{
"name": "RHSA-2018:0003",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0003"
},
{
"name": "RHSA-2018:0005",
"refsource": "REDHAT",

View File

@ -53,25 +53,15 @@
"references": {
"reference_data": [
{
"name" : "http://www.tcpdump.org/tcpdump-changes.txt",
"refsource" : "CONFIRM",
"url" : "http://www.tcpdump.org/tcpdump-changes.txt"
"name": "GLSA-201709-23",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201709-23"
},
{
"name": "https://github.com/the-tcpdump-group/tcpdump/commit/8512734883227c11568bb35da1d48b9f8466f43f",
"refsource": "CONFIRM",
"url": "https://github.com/the-tcpdump-group/tcpdump/commit/8512734883227c11568bb35da1d48b9f8466f43f"
},
{
"name" : "https://github.com/the-tcpdump-group/tcpdump/commit/9be4e0b5938b705e7e36cfcb110a740c6ff0cb97",
"refsource" : "CONFIRM",
"url" : "https://github.com/the-tcpdump-group/tcpdump/commit/9be4e0b5938b705e7e36cfcb110a740c6ff0cb97"
},
{
"name" : "https://github.com/the-tcpdump-group/tcpdump/commit/a7e5f58f402e6919ec444a57946bade7dfd6b184",
"refsource" : "CONFIRM",
"url" : "https://github.com/the-tcpdump-group/tcpdump/commit/a7e5f58f402e6919ec444a57946bade7dfd6b184"
},
{
"name": "https://support.apple.com/HT208221",
"refsource": "CONFIRM",
@ -83,19 +73,29 @@
"url": "http://www.debian.org/security/2017/dsa-3971"
},
{
"name" : "GLSA-201709-23",
"refsource" : "GENTOO",
"url" : "https://security.gentoo.org/glsa/201709-23"
},
{
"name" : "RHEA-2018:0705",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHEA-2018:0705"
"name": "https://github.com/the-tcpdump-group/tcpdump/commit/a7e5f58f402e6919ec444a57946bade7dfd6b184",
"refsource": "CONFIRM",
"url": "https://github.com/the-tcpdump-group/tcpdump/commit/a7e5f58f402e6919ec444a57946bade7dfd6b184"
},
{
"name": "1039307",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1039307"
},
{
"name": "http://www.tcpdump.org/tcpdump-changes.txt",
"refsource": "CONFIRM",
"url": "http://www.tcpdump.org/tcpdump-changes.txt"
},
{
"name": "https://github.com/the-tcpdump-group/tcpdump/commit/9be4e0b5938b705e7e36cfcb110a740c6ff0cb97",
"refsource": "CONFIRM",
"url": "https://github.com/the-tcpdump-group/tcpdump/commit/9be4e0b5938b705e7e36cfcb110a740c6ff0cb97"
},
{
"name": "RHEA-2018:0705",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHEA-2018:0705"
}
]
}

View File

@ -53,39 +53,39 @@
"references": {
"reference_data": [
{
"name" : "https://support.apple.com/HT208324",
"name": "https://support.apple.com/HT208327",
"refsource": "CONFIRM",
"url" : "https://support.apple.com/HT208324"
"url": "https://support.apple.com/HT208327"
},
{
"name": "https://support.apple.com/HT208325",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208325"
},
{
"name" : "https://support.apple.com/HT208326",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208326"
},
{
"name" : "https://support.apple.com/HT208327",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208327"
},
{
"name" : "https://support.apple.com/HT208328",
"refsource" : "CONFIRM",
"url" : "https://support.apple.com/HT208328"
},
{
"name": "https://support.apple.com/HT208334",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208334"
},
{
"name": "https://support.apple.com/HT208324",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208324"
},
{
"name": "https://support.apple.com/HT208326",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208326"
},
{
"name": "USN-3551-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3551-1/"
},
{
"name": "https://support.apple.com/HT208328",
"refsource": "CONFIRM",
"url": "https://support.apple.com/HT208328"
}
]
}

View File

@ -1,12 +1,12 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER" : "cve@mitre.org",
"ID": "CVE-2017-16469",
"ASSIGNER": "cve@mitre.org",
"STATE": "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description": {
"description_data": [
{

View File

@ -52,50 +52,50 @@
},
"references": {
"reference_data": [
{
"name" : "https://github.com/torvalds/linux/commit/ea04efee7635c9120d015dcdeeeb6988130cb67a",
"refsource" : "MISC",
"url" : "https://github.com/torvalds/linux/commit/ea04efee7635c9120d015dcdeeeb6988130cb67a"
},
{
"name" : "https://groups.google.com/d/msg/syzkaller/q6jjr1OhqO8/WcA99AVFBAAJ",
"refsource" : "MISC",
"url" : "https://groups.google.com/d/msg/syzkaller/q6jjr1OhqO8/WcA99AVFBAAJ"
},
{
"name": "USN-3617-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3617-1/"
},
{
"name" : "USN-3617-2",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3617-2/"
},
{
"name" : "USN-3617-3",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3617-3/"
},
{
"name" : "USN-3619-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3619-1/"
},
{
"name": "USN-3619-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3619-2/"
},
{
"name": "USN-3617-3",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3617-3/"
},
{
"name": "USN-3754-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3754-1/"
},
{
"name": "https://github.com/torvalds/linux/commit/ea04efee7635c9120d015dcdeeeb6988130cb67a",
"refsource": "MISC",
"url": "https://github.com/torvalds/linux/commit/ea04efee7635c9120d015dcdeeeb6988130cb67a"
},
{
"name": "101768",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101768"
},
{
"name": "https://groups.google.com/d/msg/syzkaller/q6jjr1OhqO8/WcA99AVFBAAJ",
"refsource": "MISC",
"url": "https://groups.google.com/d/msg/syzkaller/q6jjr1OhqO8/WcA99AVFBAAJ"
},
{
"name": "USN-3617-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3617-2/"
},
{
"name": "USN-3619-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3619-1/"
}
]
}

View File

@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-191-03",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-191-03"
},
{
"name": "105101",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105101"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-191-03",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-191-03"
}
]
}

View File

@ -58,9 +58,9 @@
"url": "https://robotattack.org/"
},
{
"name" : "https://support.radware.com/app/answers/answer_view/a_id/1010361/~/cve-2017-17427-adaptive-chosen-ciphertext-attack-vulnerability",
"refsource" : "CONFIRM",
"url" : "https://support.radware.com/app/answers/answer_view/a_id/1010361/~/cve-2017-17427-adaptive-chosen-ciphertext-attack-vulnerability"
"name": "102199",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102199"
},
{
"name": "VU#144389",
@ -68,9 +68,9 @@
"url": "https://www.kb.cert.org/vuls/id/144389"
},
{
"name" : "102199",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/102199"
"name": "https://support.radware.com/app/answers/answer_view/a_id/1010361/~/cve-2017-17427-adaptive-chosen-ciphertext-attack-vulnerability",
"refsource": "CONFIRM",
"url": "https://support.radware.com/app/answers/answer_view/a_id/1010361/~/cve-2017-17427-adaptive-chosen-ciphertext-attack-vulnerability"
}
]
}

View File

@ -52,15 +52,15 @@
},
"references": {
"reference_data": [
{
"name" : "43263",
"refsource" : "EXPLOIT-DB",
"url" : "https://www.exploit-db.com/exploits/43263/"
},
{
"name": "https://packetstormsecurity.com/files/145299/Advance-B2B-Script-2.1.3-SQL-Injection.html",
"refsource": "MISC",
"url": "https://packetstormsecurity.com/files/145299/Advance-B2B-Script-2.1.3-SQL-Injection.html"
},
{
"name": "43263",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43263/"
}
]
}

View File

@ -62,16 +62,16 @@
"refsource": "CONFIRM",
"url": "https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html"
},
{
"name" : "DSA-4352",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4352"
},
{
"name": "RHSA-2018:3803",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3803"
},
{
"name": "DSA-4352",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4352"
},
{
"name": "106084",
"refsource": "BID",

View File

@ -52,25 +52,25 @@
},
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20181228 [SECURITY] [DLA 1591-2] libphp-phpmailer regression update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/12/msg00020.html"
},
{
"name": "https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.27",
"refsource": "MISC",
"url": "https://github.com/PHPMailer/PHPMailer/releases/tag/v5.2.27"
},
{
"name" : "https://github.com/PHPMailer/PHPMailer/releases/tag/v6.0.6",
"refsource" : "MISC",
"url" : "https://github.com/PHPMailer/PHPMailer/releases/tag/v6.0.6"
"name": "[debian-lts-announce] 20181228 [SECURITY] [DLA 1591-2] libphp-phpmailer regression update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00020.html"
},
{
"name": "DSA-4351",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4351"
},
{
"name": "https://github.com/PHPMailer/PHPMailer/releases/tag/v6.0.6",
"refsource": "MISC",
"url": "https://github.com/PHPMailer/PHPMailer/releases/tag/v6.0.6"
}
]
}

View File

@ -1,6 +1,6 @@
{
"CVE_data_meta": {
"ASSIGNER" : "sfowler@redhat.com",
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2018-1061",
"STATE": "PUBLIC"
},
@ -72,9 +72,19 @@
"references": {
"reference_data": [
{
"name" : "[debian-lts-announce] 20180925 [SECURITY] [DLA 1519-1] python2.7 security update",
"refsource" : "MLIST",
"url" : "https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html"
"name": "DSA-4306",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4306"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061"
},
{
"name": "1042001",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1042001"
},
{
"name": "[debian-lts-announce] 20180926 [SECURITY] [DLA 1520-1] python3.4 security update",
@ -87,14 +97,9 @@
"url": "https://bugs.python.org/issue32981"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1061"
},
{
"name" : "https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1",
"refsource" : "CONFIRM",
"url" : "https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1"
"name": "USN-3817-2",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3817-2/"
},
{
"name": "https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1",
@ -102,39 +107,34 @@
"url": "https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-5-release-candidate-1"
},
{
"name" : "DSA-4306",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4306"
},
{
"name" : "DSA-4307",
"refsource" : "DEBIAN",
"url" : "https://www.debian.org/security/2018/dsa-4307"
},
{
"name" : "RHSA-2018:3041",
"refsource" : "REDHAT",
"url" : "https://access.redhat.com/errata/RHSA-2018:3041"
"name": "https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1",
"refsource": "CONFIRM",
"url": "https://docs.python.org/3.5/whatsnew/changelog.html#python-3-5-6-release-candidate-1"
},
{
"name": "RHSA-2018:3505",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3505"
},
{
"name": "RHSA-2018:3041",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:3041"
},
{
"name": "DSA-4307",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4307"
},
{
"name": "USN-3817-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3817-1/"
},
{
"name" : "USN-3817-2",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3817-2/"
},
{
"name" : "1042001",
"refsource" : "SECTRACK",
"url" : "http://www.securitytracker.com/id/1042001"
"name": "[debian-lts-announce] 20180925 [SECURITY] [DLA 1519-1] python2.7 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00030.html"
}
]
}

View File

@ -54,29 +54,29 @@
"references": {
"reference_data": [
{
"name" : "[oss-security] 20180423 Multiple local root vulnerabilities involving PackageKit CVE-2018-1106",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2018/04/23/3"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1565992",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1565992"
"name": "USN-3634-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/3634-1/"
},
{
"name": "DSA-4207",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4207"
},
{
"name": "[oss-security] 20180423 Multiple local root vulnerabilities involving PackageKit CVE-2018-1106",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2018/04/23/3"
},
{
"name": "RHSA-2018:1224",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:1224"
},
{
"name" : "USN-3634-1",
"refsource" : "UBUNTU",
"url" : "https://usn.ubuntu.com/3634-1/"
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1565992",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1565992"
}
]
}

View File

@ -53,15 +53,15 @@
},
"references": {
"reference_data": [
{
"name" : "https://source.android.com/security/bulletin/pixel/2018-04-01",
"refsource" : "CONFIRM",
"url" : "https://source.android.com/security/bulletin/pixel/2018-04-01"
},
{
"name": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=53e6d889ac29336ba212a0d4a987455a85736fa8",
"refsource": "CONFIRM",
"url": "https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=53e6d889ac29336ba212a0d4a987455a85736fa8"
},
{
"name": "https://source.android.com/security/bulletin/pixel/2018-04-01",
"refsource": "CONFIRM",
"url": "https://source.android.com/security/bulletin/pixel/2018-04-01"
}
]
}